Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    167s
  • max time network
    180s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01/05/2023, 18:43

General

  • Target

    db456aaad0aa05c1f3003ce81c31d3d4f78fdbed7c497328f661e2874377e524.exe

  • Size

    618KB

  • MD5

    acbd86cf2e13d98e8bc317f7a5b8bea9

  • SHA1

    b29c7228cdee3a641a124bbad05033341505eaee

  • SHA256

    db456aaad0aa05c1f3003ce81c31d3d4f78fdbed7c497328f661e2874377e524

  • SHA512

    09cb930b4e75c1f24c76040e051989d954a95963a4e8a2c29a760226b0425ec2aa742a48dfb942c4d9b1e598d7de573de988e36d171a4a0f427ca78769346301

  • SSDEEP

    12288:Vy90QZe3X1Bpzq/mfNv+ySUbrjHQhsVY5d2FO55MWf7dZg5:VysH1BAulGyPrjwhsVY5d2iLZY

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db456aaad0aa05c1f3003ce81c31d3d4f78fdbed7c497328f661e2874377e524.exe
    "C:\Users\Admin\AppData\Local\Temp\db456aaad0aa05c1f3003ce81c31d3d4f78fdbed7c497328f661e2874377e524.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st410223.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st410223.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1984
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\65941907.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\65941907.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:568
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp455139.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp455139.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:764

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st410223.exe

    Filesize

    464KB

    MD5

    011d83776f4ce14b9ce22a29a9c92b66

    SHA1

    34c519e4676299df6f813f857caa3fd150a8e4af

    SHA256

    1062295f0f4e56089390c940d36c64c9a947c61fd0b857f7d17726f8dc55f208

    SHA512

    104e5360f0952e5bf9053c47c5aa53610e91c066d863cc3c6ffde34240ea1c7a5e1d2d2670019184b7f1182068b36ec7de1fe1ee0c016b4bb11c8cbcef67969b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st410223.exe

    Filesize

    464KB

    MD5

    011d83776f4ce14b9ce22a29a9c92b66

    SHA1

    34c519e4676299df6f813f857caa3fd150a8e4af

    SHA256

    1062295f0f4e56089390c940d36c64c9a947c61fd0b857f7d17726f8dc55f208

    SHA512

    104e5360f0952e5bf9053c47c5aa53610e91c066d863cc3c6ffde34240ea1c7a5e1d2d2670019184b7f1182068b36ec7de1fe1ee0c016b4bb11c8cbcef67969b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\65941907.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\65941907.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp455139.exe

    Filesize

    478KB

    MD5

    4d6c549d0fa47803ffb7a05850de5eb4

    SHA1

    21f7938d8ed065c5e61aa43dcc9f82d75ad75543

    SHA256

    656aa2370de70781f0bd917b0ca38372f3d686ece33b7731378badc09502984c

    SHA512

    4d0526032bb32364f802892d84ea69de73ba3fcae55a87a5774f48008750f303628a9a1093142732a8b1fab756155bf5f5e0186b29ebf225bd180e00178ca8f3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp455139.exe

    Filesize

    478KB

    MD5

    4d6c549d0fa47803ffb7a05850de5eb4

    SHA1

    21f7938d8ed065c5e61aa43dcc9f82d75ad75543

    SHA256

    656aa2370de70781f0bd917b0ca38372f3d686ece33b7731378badc09502984c

    SHA512

    4d0526032bb32364f802892d84ea69de73ba3fcae55a87a5774f48008750f303628a9a1093142732a8b1fab756155bf5f5e0186b29ebf225bd180e00178ca8f3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp455139.exe

    Filesize

    478KB

    MD5

    4d6c549d0fa47803ffb7a05850de5eb4

    SHA1

    21f7938d8ed065c5e61aa43dcc9f82d75ad75543

    SHA256

    656aa2370de70781f0bd917b0ca38372f3d686ece33b7731378badc09502984c

    SHA512

    4d0526032bb32364f802892d84ea69de73ba3fcae55a87a5774f48008750f303628a9a1093142732a8b1fab756155bf5f5e0186b29ebf225bd180e00178ca8f3

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st410223.exe

    Filesize

    464KB

    MD5

    011d83776f4ce14b9ce22a29a9c92b66

    SHA1

    34c519e4676299df6f813f857caa3fd150a8e4af

    SHA256

    1062295f0f4e56089390c940d36c64c9a947c61fd0b857f7d17726f8dc55f208

    SHA512

    104e5360f0952e5bf9053c47c5aa53610e91c066d863cc3c6ffde34240ea1c7a5e1d2d2670019184b7f1182068b36ec7de1fe1ee0c016b4bb11c8cbcef67969b

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st410223.exe

    Filesize

    464KB

    MD5

    011d83776f4ce14b9ce22a29a9c92b66

    SHA1

    34c519e4676299df6f813f857caa3fd150a8e4af

    SHA256

    1062295f0f4e56089390c940d36c64c9a947c61fd0b857f7d17726f8dc55f208

    SHA512

    104e5360f0952e5bf9053c47c5aa53610e91c066d863cc3c6ffde34240ea1c7a5e1d2d2670019184b7f1182068b36ec7de1fe1ee0c016b4bb11c8cbcef67969b

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\65941907.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp455139.exe

    Filesize

    478KB

    MD5

    4d6c549d0fa47803ffb7a05850de5eb4

    SHA1

    21f7938d8ed065c5e61aa43dcc9f82d75ad75543

    SHA256

    656aa2370de70781f0bd917b0ca38372f3d686ece33b7731378badc09502984c

    SHA512

    4d0526032bb32364f802892d84ea69de73ba3fcae55a87a5774f48008750f303628a9a1093142732a8b1fab756155bf5f5e0186b29ebf225bd180e00178ca8f3

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp455139.exe

    Filesize

    478KB

    MD5

    4d6c549d0fa47803ffb7a05850de5eb4

    SHA1

    21f7938d8ed065c5e61aa43dcc9f82d75ad75543

    SHA256

    656aa2370de70781f0bd917b0ca38372f3d686ece33b7731378badc09502984c

    SHA512

    4d0526032bb32364f802892d84ea69de73ba3fcae55a87a5774f48008750f303628a9a1093142732a8b1fab756155bf5f5e0186b29ebf225bd180e00178ca8f3

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp455139.exe

    Filesize

    478KB

    MD5

    4d6c549d0fa47803ffb7a05850de5eb4

    SHA1

    21f7938d8ed065c5e61aa43dcc9f82d75ad75543

    SHA256

    656aa2370de70781f0bd917b0ca38372f3d686ece33b7731378badc09502984c

    SHA512

    4d0526032bb32364f802892d84ea69de73ba3fcae55a87a5774f48008750f303628a9a1093142732a8b1fab756155bf5f5e0186b29ebf225bd180e00178ca8f3

  • memory/568-72-0x00000000000F0000-0x00000000000FA000-memory.dmp

    Filesize

    40KB

  • memory/764-101-0x00000000025A0000-0x00000000025D5000-memory.dmp

    Filesize

    212KB

  • memory/764-117-0x00000000025A0000-0x00000000025D5000-memory.dmp

    Filesize

    212KB

  • memory/764-85-0x0000000004F60000-0x0000000004FA0000-memory.dmp

    Filesize

    256KB

  • memory/764-86-0x0000000004F60000-0x0000000004FA0000-memory.dmp

    Filesize

    256KB

  • memory/764-87-0x00000000025A0000-0x00000000025DA000-memory.dmp

    Filesize

    232KB

  • memory/764-88-0x00000000025A0000-0x00000000025D5000-memory.dmp

    Filesize

    212KB

  • memory/764-89-0x00000000025A0000-0x00000000025D5000-memory.dmp

    Filesize

    212KB

  • memory/764-91-0x00000000025A0000-0x00000000025D5000-memory.dmp

    Filesize

    212KB

  • memory/764-93-0x00000000025A0000-0x00000000025D5000-memory.dmp

    Filesize

    212KB

  • memory/764-95-0x00000000025A0000-0x00000000025D5000-memory.dmp

    Filesize

    212KB

  • memory/764-97-0x00000000025A0000-0x00000000025D5000-memory.dmp

    Filesize

    212KB

  • memory/764-99-0x00000000025A0000-0x00000000025D5000-memory.dmp

    Filesize

    212KB

  • memory/764-83-0x0000000002560000-0x000000000259C000-memory.dmp

    Filesize

    240KB

  • memory/764-103-0x00000000025A0000-0x00000000025D5000-memory.dmp

    Filesize

    212KB

  • memory/764-105-0x00000000025A0000-0x00000000025D5000-memory.dmp

    Filesize

    212KB

  • memory/764-107-0x00000000025A0000-0x00000000025D5000-memory.dmp

    Filesize

    212KB

  • memory/764-109-0x00000000025A0000-0x00000000025D5000-memory.dmp

    Filesize

    212KB

  • memory/764-111-0x00000000025A0000-0x00000000025D5000-memory.dmp

    Filesize

    212KB

  • memory/764-113-0x00000000025A0000-0x00000000025D5000-memory.dmp

    Filesize

    212KB

  • memory/764-84-0x0000000000240000-0x0000000000286000-memory.dmp

    Filesize

    280KB

  • memory/764-115-0x00000000025A0000-0x00000000025D5000-memory.dmp

    Filesize

    212KB

  • memory/764-119-0x00000000025A0000-0x00000000025D5000-memory.dmp

    Filesize

    212KB

  • memory/764-121-0x00000000025A0000-0x00000000025D5000-memory.dmp

    Filesize

    212KB

  • memory/764-123-0x00000000025A0000-0x00000000025D5000-memory.dmp

    Filesize

    212KB

  • memory/764-125-0x00000000025A0000-0x00000000025D5000-memory.dmp

    Filesize

    212KB

  • memory/764-127-0x00000000025A0000-0x00000000025D5000-memory.dmp

    Filesize

    212KB

  • memory/764-129-0x00000000025A0000-0x00000000025D5000-memory.dmp

    Filesize

    212KB

  • memory/764-131-0x00000000025A0000-0x00000000025D5000-memory.dmp

    Filesize

    212KB

  • memory/764-133-0x00000000025A0000-0x00000000025D5000-memory.dmp

    Filesize

    212KB

  • memory/764-135-0x00000000025A0000-0x00000000025D5000-memory.dmp

    Filesize

    212KB

  • memory/764-137-0x00000000025A0000-0x00000000025D5000-memory.dmp

    Filesize

    212KB

  • memory/764-139-0x00000000025A0000-0x00000000025D5000-memory.dmp

    Filesize

    212KB

  • memory/764-141-0x00000000025A0000-0x00000000025D5000-memory.dmp

    Filesize

    212KB

  • memory/764-143-0x00000000025A0000-0x00000000025D5000-memory.dmp

    Filesize

    212KB

  • memory/764-145-0x00000000025A0000-0x00000000025D5000-memory.dmp

    Filesize

    212KB

  • memory/764-147-0x00000000025A0000-0x00000000025D5000-memory.dmp

    Filesize

    212KB

  • memory/764-149-0x00000000025A0000-0x00000000025D5000-memory.dmp

    Filesize

    212KB

  • memory/764-151-0x00000000025A0000-0x00000000025D5000-memory.dmp

    Filesize

    212KB

  • memory/764-881-0x0000000004F60000-0x0000000004FA0000-memory.dmp

    Filesize

    256KB

  • memory/764-883-0x0000000004F60000-0x0000000004FA0000-memory.dmp

    Filesize

    256KB